CISSP Security Controls Cheatsheet
1. Security Control Categories (by Nature)
These define how the control is implemented:
- Physical: Tangible controls like fences, locks, guards, CCTV.
- Technical (Logical): Technology-based controls like firewalls, antivirus, encryption.
- Administrative: Policy and human-process-based controls like training, background checks, and procedures.
2. Security Control Types (by Function)
These define what the control is intended to do:
- Preventive: Stops incidents before they occur (e.g., firewalls, locks).
- Detective: Identifies incidents during or after they occur (e.g., IDS, audit logs).
- Corrective: Fixes issues after detection (e.g., patching, backups).
- Deterrent: Discourages attacks (e.g., warning signs, visible CCTV).
- Recovery: Helps restore operations (e.g., disaster recovery systems).
- Compensating: Alternative control when the primary is not feasible (e.g., manual reviews).
3. Example Control Mapping
| Control | Category | Types |
|-----------------------|------------------|-------------------------------|
| Surveillance Camera | Physical | Detective, Deterrent |
| Firewall | Technical | Preventive |
| Security Training | Administrative | Preventive, Deterrent |
| Backups | Technical | Corrective, Recovery |
| Policies | Administrative | Preventive |
| Biometric Access | Technical/Physical| Preventive |
| Audit Logs | Technical | Detective |
| Guard Dog | Physical | Deterrent, Detective |